Tensorflow is an Open Source Machine Learning Framework. The implementations of `Sparse*Cwise*` ops are vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) or `CHECK`-fails when building new `TensorShape` objects (so, assert failures based denial of service). We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
History

Mon, 05 May 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2022-02-03T11:52:48.000Z

Updated: 2025-05-05T16:26:32.511Z

Reserved: 2022-01-19T00:00:00.000Z

Link: CVE-2022-23567

cve-icon Vulnrichment

Updated: 2024-08-03T03:43:46.449Z

cve-icon NVD

Status : Modified

Published: 2022-02-03T12:15:08.117

Modified: 2025-05-05T17:17:57.133

Link: CVE-2022-23567

cve-icon Redhat

No data.